Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14844: CWE-639 Authorization Bypass Through User-Controlled Key in stellarwp Membership Plugin – Restrict Content

0
High
VulnerabilityCVE-2025-14844cvecve-2025-14844cwe-639
Published: Fri Jan 16 2026 (01/16/2026, 09:23:46 UTC)
Source: CVE Database V5
Vendor/Project: stellarwp
Product: Membership Plugin – Restrict Content

Description

The Membership Plugin – Restrict Content plugin for WordPress is vulnerable to Missing Authentication in all versions up to, and including, 3.2.16 via the 'rcp_stripe_create_setup_intent_for_saved_card' function due to missing capability check. Additionally, the plugin does not check a user-controlled key, which makes it possible for unauthenticated attackers to leak Stripe SetupIntent client_secret values for any membership.

AI-Powered Analysis

AILast updated: 01/16/2026, 09:50:58 UTC

Technical Analysis

CVE-2025-14844 is a vulnerability classified under CWE-639 (Authorization Bypass Through User-Controlled Key) found in the Membership Plugin – Restrict Content for WordPress, developed by stellarwp. The issue exists in all plugin versions up to and including 3.2.16 within the function 'rcp_stripe_create_setup_intent_for_saved_card'. This function lacks proper capability checks, meaning it does not verify whether the requesting user has the necessary permissions to execute the operation. Additionally, the plugin fails to validate a user-controlled key parameter, which can be manipulated by an attacker. As a result, unauthenticated attackers can invoke this function to retrieve Stripe SetupIntent client_secret values tied to any membership. The client_secret is a sensitive token used in Stripe's payment setup process, and its exposure can lead to unauthorized payment method setups or fraud. The vulnerability is remotely exploitable over the network without any authentication or user interaction, as indicated by the CVSS vector (AV:N/AC:L/PR:N/UI:N). The impact is primarily on confidentiality, with a high severity score of 8.2, while integrity and availability impacts are low or none. No patches or fixes are currently linked, and no known exploits have been reported in the wild, but the vulnerability poses a significant risk to websites using this plugin for membership and payment management. Attackers could leverage this flaw to compromise payment setups, potentially leading to financial fraud or data breaches involving payment information.

Potential Impact

For European organizations, especially those operating e-commerce platforms or membership-based services using WordPress with the Membership Plugin – Restrict Content, this vulnerability presents a serious risk. The unauthorized disclosure of Stripe SetupIntent client_secret values can lead to fraudulent payment method setups, unauthorized charges, or broader compromise of payment workflows. This can result in financial losses, reputational damage, and regulatory penalties under GDPR due to exposure of payment-related data. The vulnerability's ease of exploitation without authentication increases the attack surface, making automated scanning and exploitation plausible. Organizations relying on this plugin for subscription or membership management are particularly vulnerable. The impact extends to customer trust and compliance with payment card industry standards (PCI DSS). Additionally, the lack of integrity and availability impact means attackers cannot modify or disrupt services directly but can silently exfiltrate sensitive payment setup data, which may be leveraged in further attacks or fraud schemes.

Mitigation Recommendations

1. Immediate action should be to monitor the vendor's official channels for a security patch and apply it as soon as it becomes available. 2. Until a patch is released, implement web application firewall (WAF) rules to block or restrict access to the 'rcp_stripe_create_setup_intent_for_saved_card' endpoint or function, especially from unauthenticated users or IP addresses outside trusted ranges. 3. Conduct a thorough audit of WordPress user roles and capabilities to ensure no excessive permissions are granted that could be exploited. 4. Employ strict input validation and parameter sanitization on all plugin endpoints, particularly those handling payment-related data. 5. Enable detailed logging and monitoring of API calls related to Stripe payment setups to detect anomalous or unauthorized access attempts. 6. Consider temporarily disabling the Membership Plugin – Restrict Content if the risk outweighs operational needs until a fix is applied. 7. Educate development and security teams about this vulnerability to ensure rapid response and awareness. 8. Review Stripe account security settings, including webhook secrets and API keys, to detect any suspicious activity and rotate keys if necessary. 9. Engage with penetration testing or security assessments focused on payment processing workflows to identify any additional weaknesses.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
Wordfence
Date Reserved
2025-12-17T18:34:48.898Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 696a06a5b22c7ad8685c6d8d

Added to database: 1/16/2026, 9:36:37 AM

Last enriched: 1/16/2026, 9:50:58 AM

Last updated: 2/4/2026, 10:53:01 PM

Views: 80

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats